Size | 1.6MB |
---|---|
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | 8288d47a72734e79e33f5ab38069c97e |
SHA1 | 2a50e2a9216ebafc567feeec40a694168093b611 |
SHA256 | ff1296a29a39cb1d8b3df1cb8102fd05136fb6e82386491c5e14fc25e2f94f56 |
SHA512 |
7afc04c43d965e1b292276b425f09688b91cc05f87202e97ee7eda9e493f043795bcef17bd4cc6e2fdd9f8b53d6b9752fe00a673fe19e4862f407b96ba5f78fd
|
CRC32 | 3FA2D49D |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 9.3 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | May 30, 2025, 8:59 p.m. | May 30, 2025, 8:59 p.m. | 32 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-05-30 20:59:19,046 [analyzer] DEBUG: Starting analyzer from: C:\tmpmdfut4 2025-05-30 20:59:19,062 [analyzer] DEBUG: Pipe server name: \??\PIPE\eeehPhMHRCIsBQntzJidBBRzDz 2025-05-30 20:59:19,062 [analyzer] DEBUG: Log pipe server name: \??\PIPE\LPEPAFbLQOXsQrWwca 2025-05-30 20:59:19,358 [analyzer] DEBUG: Started auxiliary module Curtain 2025-05-30 20:59:19,358 [analyzer] DEBUG: Started auxiliary module DbgView 2025-05-30 20:59:19,828 [analyzer] DEBUG: Started auxiliary module Disguise 2025-05-30 20:59:20,015 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-05-30 20:59:20,015 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-05-30 20:59:20,015 [analyzer] DEBUG: Started auxiliary module Human 2025-05-30 20:59:20,015 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-05-30 20:59:20,015 [analyzer] DEBUG: Started auxiliary module Reboot 2025-05-30 20:59:20,108 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-05-30 20:59:20,125 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-05-30 20:59:20,125 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-05-30 20:59:20,125 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-05-30 20:59:20,296 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\sGe7ljJ.exe' with arguments '' and pid 1996 2025-05-30 20:59:20,562 [analyzer] DEBUG: Loaded monitor into process with pid 1996 2025-05-30 20:59:21,296 [analyzer] INFO: Process with pid 1996 has terminated 2025-05-30 20:59:21,296 [analyzer] INFO: Process list is empty, terminating analysis. 2025-05-30 20:59:22,562 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-05-30 20:59:22,562 [analyzer] INFO: Analysis completed.
2025-05-30 20:59:25,499 [cuckoo.core.scheduler] INFO: Task #6518123: acquired machine win7x644 (label=win7x644) 2025-05-30 20:59:25,499 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.204 for task #6518123 2025-05-30 20:59:25,839 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3855192 (interface=vboxnet0, host=192.168.168.204) 2025-05-30 20:59:26,394 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x644 2025-05-30 20:59:27,113 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x644 to vmcloak 2025-05-30 20:59:36,116 [cuckoo.core.guest] INFO: Starting analysis #6518123 on guest (id=win7x644, ip=192.168.168.204) 2025-05-30 20:59:37,121 [cuckoo.core.guest] DEBUG: win7x644: not ready yet 2025-05-30 20:59:42,145 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x644, ip=192.168.168.204) 2025-05-30 20:59:42,213 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x644, ip=192.168.168.204, monitor=latest, size=6660546) 2025-05-30 20:59:43,717 [cuckoo.core.resultserver] DEBUG: Task #6518123: live log analysis.log initialized. 2025-05-30 20:59:44,674 [cuckoo.core.resultserver] DEBUG: Task #6518123 is sending a BSON stream 2025-05-30 20:59:45,143 [cuckoo.core.resultserver] DEBUG: Task #6518123 is sending a BSON stream 2025-05-30 20:59:45,963 [cuckoo.core.resultserver] DEBUG: Task #6518123: File upload for 'shots/0001.jpg' 2025-05-30 20:59:45,974 [cuckoo.core.resultserver] DEBUG: Task #6518123 uploaded file length: 116191 2025-05-30 20:59:47,095 [cuckoo.core.resultserver] DEBUG: Task #6518123: File upload for 'shots/0002.jpg' 2025-05-30 20:59:47,108 [cuckoo.core.resultserver] DEBUG: Task #6518123 uploaded file length: 133507 2025-05-30 20:59:47,185 [cuckoo.core.resultserver] DEBUG: Task #6518123: File upload for 'curtain/1748631562.45.curtain.log' 2025-05-30 20:59:47,188 [cuckoo.core.resultserver] DEBUG: Task #6518123 uploaded file length: 36 2025-05-30 20:59:47,290 [cuckoo.core.resultserver] DEBUG: Task #6518123: File upload for 'sysmon/1748631562.56.sysmon.xml' 2025-05-30 20:59:47,293 [cuckoo.core.resultserver] DEBUG: Task #6518123 uploaded file length: 46292 2025-05-30 20:59:48,136 [cuckoo.core.resultserver] DEBUG: Task #6518123 had connection reset for <Context for LOG> 2025-05-30 20:59:49,222 [cuckoo.core.guest] INFO: win7x644: analysis completed successfully 2025-05-30 20:59:49,237 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-05-30 20:59:49,261 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-05-30 20:59:50,113 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x644 to path /srv/cuckoo/cwd/storage/analyses/6518123/memory.dmp 2025-05-30 20:59:50,115 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x644 2025-05-30 20:59:57,865 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.204 for task #6518123 2025-05-30 20:59:58,110 [cuckoo.core.scheduler] DEBUG: Released database task #6518123 2025-05-30 20:59:58,129 [cuckoo.core.scheduler] INFO: Task #6518123: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Affect private profile | rule | win_files_operation |
section | .gxfg |
section | .retplne |
section | _RDATA |
section | .can |
section | {u'size_of_data': u'0x000cce00', u'virtual_address': u'0x00001000', u'entropy': 6.959694542887808, u'name': u'.text', u'virtual_size': u'0x000ccd7e'} | entropy | 6.95969454289 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00054400', u'virtual_address': u'0x000f0000', u'entropy': 7.999522360900223, u'name': u'.can', u'virtual_size': u'0x00054400'} | entropy | 7.9995223609 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00054400', u'virtual_address': u'0x00145000', u'entropy': 7.999522360900223, u'name': u'.can', u'virtual_size': u'0x00054400'} | entropy | 7.9995223609 | description | A section with a high entropy has been found | |||||||||
entropy | 0.93489827856 | description | Overall entropy of this PE file is high |
G Data Antivirus (Windows) | Virus: Gen:Variant.Lazy.682006 (Engine A) |
C4S ClamAV (Linux) | Win.Packed.Agen-10045321-0 |
eScan Antivirus (Linux) | Gen:Variant.Lazy.682006(DB) |
ESET Security (Windows) | a variant of Win64/GenKryptik.HIDQ trojan |
Sophos Anti-Virus (Linux) | Troj/Krypt-AQA |
ClamAV (Linux) | Win.Packed.Agen-10045321-0 |
Bitdefender Antivirus (Linux) | Gen:Variant.Lazy.682006 |
Kaspersky Standard (Windows) | VHO:Trojan-PSW.Win32.Convagent.gen |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Lazy.682006 (B) |